CONCEPTION OF ORGANIZATIONAL BUILDING A PROTECTED INFORMATION SYSTEM OF A BUSINESS

Author(s):  
Andrey Ravilevich Gazizov

The article discusses the concept of organizational formation of the protected information system of a commercial enterprise. The content and classification of information resources, subject to the characteristics of the trading activities, information about customers, employees, communicative, general, financial and legal data have been given; the level of importance has been revealed. The basic principles of creating the protected information system in terms of specificity of a commercial enterprise (continuity, integrity, systemacy, legitimacy) have been formulated. Taking into account the specified principles, the thematic content of requirements to the protected information system has been determined: centralization, planning, preciseness, purposefulness, activity, reliability, flexibility, originality, openness, economic efficiency. There are given recommendations to building a secure information system, which include easy maintenance and transparency for users of the mechanisms of the information system protection; a minimum set of privileges for users; ability to disable the security mechanisms of information system in the critical circumstances; independence of protection mechanisms from the information system; assumptions about the worst intentions and potential users’ errors; minimization of information about existing mechanisms of information system protection. It has been determined that the information system protection includes two components: organizational and administrative (including the internal documents regulating the issues of protection) and technical (including the subsystems of anti-virus protection, back up and archiving, email security, intrusion detection, protection of data transmission channels, identification and authentication of users); their functional purpose being analyzed. The purpose and content of security policy of information system were determined as a theoretical basis of organizational and administrative components of the protection system. It has been inferred about the universality of the presented method providing secure communication for the users of a business.

2016 ◽  
pp. 38-59
Author(s):  
Edison Fontes ◽  
Antonio José Balloni

In this chapter, the reader finds a structured definition to develop, implement, and keep the needed regulatory rules or principles for an Information System Security (ISS). In addition, the reader finds how to ensure the right use of this ISS, as well as in authorization and protection against disaster situations such as an effective system protection when accessing, storing, using, and retrieving the information in normal or contingency situations. This compound is the structure of information security policy that is based on a set of controls as described in NBR ISO/IEC 27002 (ABNT, 2005). The definition of this structure for the information security policy is important because the Norm ABNT (2005) does not indicate nor define—nor explain—how the structure of this policy should be (i.e., which are the fundamental elements and functions, which are the standards of rules for the controls and other practical issues) so that the policy could be effective for the organization. The structure shown in this chapter represents a practical and useful architecture regarding the elements of the information security policy of the organization.


Author(s):  
Edison Fontes ◽  
Antonio José Balloni

In this chapter, the reader finds a structured definition to develop, implement, and keep the needed regulatory rules or principles for an Information System Security (ISS). In addition, the reader finds how to ensure the right use of this ISS, as well as in authorization and protection against disaster situations such as an effective system protection when accessing, storing, using, and retrieving the information in normal or contingency situations. This compound is the structure of information security policy that is based on a set of controls as described in NBR ISO/IEC 27002 (ABNT, 2005). The definition of this structure for the information security policy is important because the Norm ABNT (2005) does not indicate nor define—nor explain—how the structure of this policy should be (i.e., which are the fundamental elements and functions, which are the standards of rules for the controls and other practical issues) so that the policy could be effective for the organization. The structure shown in this chapter represents a practical and useful architecture regarding the elements of the information security policy of the organization.


2018 ◽  
Vol 7 (4.38) ◽  
pp. 1146
Author(s):  
V. K. Kalichkin ◽  
A. I. Pavlova ◽  
A. F. Petrov ◽  
V. A. Smolyakov

The article proposes the methodology for the automated classification of uplands using Geographic Information System (GIS) and Neural Expert System (NES). Quantitative indicators of topography are used as the basis of the proposed classification. A database consisting of topographic, soil, and land use maps was created using ArcGIS 10 geographic information system. A topologically correct digital elevation model (DEM) was created by the ANUDEM interpolation method. The DEM contains the following maps: hypsometric, steepness and slopes exposure, plan, profile, common curvature of the ground surface, and cumulative runoff maps. The boundaries of elementary surfaces (ES), which are homogeneous morphological formations, are established. Parameters characterizing the Stream Power Index (SPI) are taken into account. The essence of the proposed classification consists in attributing of ES to a certain group of lands based on aggregate of features. To do this, partial scales were created, containing indicators of topography, soil cover, land drainage conditions, as well as the degree of erosion development. The authors formed knowledge base for traning the NES using GIS database and partial scales of estimates. Teaching of neural network was carried out. The classification and topology of land was carried out by means of the NES. The uplands are distributed in flat and slightly convex areas. They are characterized by the following indicators: the curvature of the ground surface: plan curvature (0 – 0.03), profile curvature (0 – 0.15), common curvature (0 – 0.22); slope angles (less than 1.5о); horizontal dissection in elevation (less than 0.5 km/km2), vertical dissection (less than 5 m); and SPI (from -13.80 to -6.47). Electronic map of uplands of LLC «Salair» land-use area was created in the ArcGIS 10 environment.  


2018 ◽  
Vol 3 (2) ◽  
pp. 160
Author(s):  
Meri Chrismes Aruan ◽  
Luh Putu Widya Adnyani

The development and progress of IT-based information technology is very rapidly developing and has a very important role. Information systems are a necessity for agencies to utilize information as a basis for data administration and processing. To meet these needs, the agency conducts activities related to computer-based information systems as a tool to increase employee creativity. This system is designed to handle the transaction of escort and payment salary calculations and can guarantee validiity, complete authorization, classification of assessments, timeliness of each payroll transaction. In the Middle School Nusantara Wisata Respati Middle School still uses a manual payroll system, which is Microsoft Excel, so that people who are not authorized to enter and view data and can change the impact will disrupt the activity in processing salary data. For this reason, it is necessary to design a Java-based payroll information system at the Respati Archipelago Tourism Middle School.


2021 ◽  
Vol 2 (133) ◽  
pp. 3-11
Author(s):  
Alexander Litvinov ◽  
Mikhail Litvinov

The work is devoted to redesign of Unified Clinico-Statistical Classification of Disease. Text editor-based user interface has been developed and multilayered Architecture was provided. Such modifications made UCSCD management system more flexible, robust and main-tainable.


2018 ◽  
Vol 2 (1) ◽  
pp. 5
Author(s):  
Agus Sifaunajah ◽  
Kusworo Adi ◽  
Faikhin .

Assessment of the performance of civil servants (PNS) is still considered less objective and subjective tended to by some, so we need a solution to improve the objectivity of assessment. The target of employee work (SKP) is one solution to improve objectivity in the assessment of civil servants. Backpropagation is one of the methods in neural networks which is implemented in the information systems of SKP for used classification of data performance. Observation and literature became the method of data collection in this study. Web-based information systems of skp are facilitated for employees in the preparation of assessments. Backpropagation can be implemented to perform data classification of performance. Keyword: Neural network; Backpropagation, Classification, SKP Received: 2 February, 2017; Accepter: 15 March, 2017


2021 ◽  
Author(s):  
Ivana Radojević ◽  
◽  
Aleksandar Ostojić ◽  
Nenad Stefanović

This study was performed using the SeLaR information system (IS). SeLaR IS combines relevant data on reservoirs in Serbia and enables advanced methods of analysis, such as statistical analysis and data mining. For the data analysis, three accumulations with different morphometric properties, trophic status, and dominant community of microorganisms were selected: Gruža, Grošnica, and Bovan. The material in this research is data sets that include standard routine and broader scientific hydrobiological tests of freshwater from certain periods. The data include physicochemical, biochemical, microbiological, and other biological parameters. The analysis aimed to determine the relationship between the entities, to discover unknown relations, the regularity in the dynamics of the specific characteristics, and for predictions. Classification, analysis of influential parameters, and scenario analysis were used for this analysis. The results indicate a clear classification of the values of the total number of bacteria. The obtained models have a small number of influential parameters (one to four) with a large relative impact for each class separately. Influence parameters are different for distinct accumulations. For prediction of the total number of bacteria selected tools did not provide satisfactory results for all three reservoirs.


Author(s):  
Muhammad Z. I. Lallmahomed ◽  
Nor Zairah Ab Rahim ◽  
Roliana Ibrahim ◽  
Azizah Abdul Rahman

In the light of a diverse body of disorganized usage measures available and the difficulty of building a cumulative research tradition, a literature review is conducted on system use in Information Systems (IS) Acceptance through the two main theories of Technology Adoption, the Technology Acceptance Model (TAM), and The Unified Theory of Use and Acceptance of Technology (UTAUT). The authors seek to understand how usage measures are being operationalised and proposed a preliminary classification of those measures that covers system and task aspects of use. A Q-Sort approach was taken to validate the authors’ classification scheme and the result indicates high inter-rater agreement. The ensuing classification is meant to help researchers in their choice of system use measures. This review also summarises the arguments for a multi-dimensional measure of use and establishes that omnibus measure such as frequency, volume and use/non-use hold prevalence. Finally, the authors provide recommendations for further research in the area of system use.


Sign in / Sign up

Export Citation Format

Share Document